Accelerometer Based Real-Time Gesture Recognition

Size: px
Start display at page:

Download "Accelerometer Based Real-Time Gesture Recognition"

Transcription

1 POSTER 2008, PRAGUE MAY 15 1 Accelerometer Based Real-Time Gesture Recognition Zoltán PREKOPCSÁK 1 1 Dept. of Telecomm. and Media Informatics, Budapest University of Technology and Economics, Magyar tudósok krt. 2., H-1117 Budapest, Hungary prekopcsak@tmit.bme.hu Abstract. Gesture is a natural expression form for humans, but its recognition is a similarly hard problem as speech recognition. In this paper, I present a real-time hand gesture recognition system, which identifies relevant parts in the continous sensor data stream, and classifies them to the most probable gesture. Instead of the usual button-based segmentation, I have created an automatic segmentation method, which makes the interface more natural. The results showed that the two different classifiers reach 97.4% and 96% accuracy on a personalized gesture set, and these results can be improved for certain gesture sets with the combination of the two algorithms. Furthermore, the system has great performance and low response time, so the user experience is much better than with previous gesture recognizers. Keywords Gesture recognition, classification, accelerometer sensor, human-computer interaction. 1. Introduction Hand gesture recognition is a discipline that has been around for decades in the human-computer interaction research community. Its prototypes range from special applications like sign language interpretation [13] to general gesture recognizers, and they provide various hardware and software solutions for capturing and processing human hand motion. Lately, the Nintendo Wii game console popularized the concept with its gesture-based controller. Using Wii Remote and Nunchuk, games can be controlled by natural gestures which made the console very popular, especially for sports games. In the last few years, the fast development in sensor technology made it possible to put small accelerometer sensors into everyday devices. The Wii Remote uses these sensors to recognize hand gestures, and there are many mobile phones on the market that also have in-built accelerometers. The main advantage of using these sensors instead of visionbased methods is that the interface is not limited to a controlled environment. One of the most important visions of computer science is ubiquitous computing, which involves ambient intelligence built into our surroundings. To reach this vision, we need intuitive interfaces using speech, touch and gestures. 2. Related Works The first dynamic gesture recognition system was created by Hofmann et al. in the middle of 1990s. They have used dimensionality reduction and discrete hidden Markov models (HMM) to reduce complexity, but recognition took hours to complete [4]. Other researchers developed simpler task-specific recognizers which could operate in almost realtime mode, but these systems cannot be used in general cases [7][1]. Researchers from the Technical Research Centre of Finland (VTT) have published several articles in the past few years about general dynamic gesture recognition, mainly for mobile phone interaction. They have created a hardware module for capturing hand movements called SoapBox [12], and they have found that left-to-right HMMs provide very accurate models [8]. Although gesture-based games spread fastly all around the world, there has been very few comprehensive studies about everyday use of gesture interfaces from the design perspective. Korpipää et al. have created a context-aware interface prototype that included hand gesture recognition for smart phones, but the rule-based setup concept was quite complicated for first-time users. Their earlier works included more prototypes for specific applications [6]. My research lies in the intersection of the technical and design perspectives, as I have identified basic design principles, and created new segmentation and modified classification methods to satisfy them. This paper describes the research from the technical point-of-view, so for design aspects, please read my earlier paper [10]. 3. System Overview A gesture recognizer prototype was created for testing purposes. The input device was a Sony-Ericsson W910i mo-

2 2 Z. PREKOPCSÁK, ACCELEROMETER BASED REAL-TIME GESTURE RECOGNITION bile phone which has in-built three-dimensional accelerometer accessible from Java environment. The application collects the accelerometer sensor data stream and sends it to a computer nearby via Bluetooth connection. All other components are realized on the computer, but with great respect to low usage of resources, so they can be implemented to the mobile environment too. The accelerometer sensor provides about 25 threedimensional data vectors every second. The role of the segmentation is to identify the parts in this data stream where gestures occur. To be able to solve this problem, we need the definition of gestures. In my work, I have used the following largely technical definition: a gesture starts with rapid acceleration, continuously changes directions during gestures, ends in almost steady position, and lasts more than 0.8 seconds. This definition was selected after the extensive study of the data stream of different hand gestures. To capture gestures according to the definition, we need to do some preprocessing on the three-dimensional data stream. First of all, the definition includes statements about the changing property of acceleration, so the derivative is used, which is the difference between two consecutive elements in the discrete case. Second, the size of the vector is computed, because the system should be invariant to the order of axes. H k = (x k x k 1 ) 2 + (y k y k 1 ) 2 + (z k z k 1 ) 2 (1) This value can sign changes in acceleration and direction too, but it is very hectic so a moving average should be used. I have selected the exponential moving average (EMA), because it is fast and memory efficient. EMA Hk = αh k + (1 α)ema Hk 1 (2) Fig. 1. System block diagram with major components. When the data stream arrives to the computer, it passes through a segmentation module which identifies the beginning and the end of gestures. Only the segmented parts are forwarded to the next component. In case of teaching, the labelled gesture examples are just saved for future use. In case of recognition, it is passed to the classifier component, which includes noise filtering and identifies the most probable gesture. Depending on the gesture and the context we can define actions, so the gesture recognizer prototype can be used as an interface for mobile phones or computer applications. In the next subsections, I will describe these components in more detail Segmentation Most gesture recognizer systems use button-based segmentation, which means that the user needs to sign the beginning and the end of the gesture by pushing a button. I have decided to create an automatic segmentation method without any buttons, which results more natural interaction. A similar approach was used by Hofmann et al. [4]. I have tried several values for α, and the value 0.2 resulted smooth curves without averaging too many values. After these computations, the segmentation is as simple as monitoring a threshold on EMA Hk. While the value is over the threshold, a gesture is captured. User tests proved that this segmentation method can capture dynamic gestures, and it feels natural to use them without buttons Gesture recognition The output of the segmentation is a variable, but finite length vector containing three-dimensional elements, so it is a matrix sized 3 k. In teaching mode it is saved to the filesystem with the appropriate label attached. In recognition mode we need to decide if the matrix is very similar to one of the gestures. Two different classification methods have been implemented for this problem. Hidden Markov Models HMM is a statistical modeling tool that can be applied for modeling time-series with spatial and temporal variability [5]. As I mentioned earlier, it is frequently used for ges-

3 POSTER 2008, PRAGUE MAY 15 3 ture recognition, but it has numerous applications in speech recognition too. My algorithm was based on a recent Nokia Research Center paper [11] with some modifications. I have used the freely available JAHMM library for implementation. I have used the linear kernel with all gesture examples for teaching. During recognition, the incoming movement should be transformed and normalized the same way like the gesture examples, and then the SVM decides which gesture it belongs to Action selection Fig. 2. Left-to-right hidden Markov model with four states Continuous left-to-right HMMs have been created with 8 states for each gesture. Previous papers used to apply dimensionality reduction to reduce complexity, but it causes loss of information and current systems are able to handle this complexity in real-time. Pylvänäinen showed that no transformations are needed on the input data, as it is suited for the HMM technique in its raw format[11]. HMMs were trained with the iterative Baum-Welch algorithm and forward-backward algorithm was used for recognition. I do not explain these standard algorithms in this paper, but they can be found elsewhere [3]. In the recognition step, we calculate the probability of all gesture models for a given movement and select the most probable one. As the automatic segmentation also produces some noise movements, we need to include a probability threshold and below that we consider the movement being noise. If the threshold is too high then many real gestures will be considered noise and if it is too low then noise movements will be misclassified. Its value was determined according to test results. Support Vector Machine Support Vector Machine (SVM) is a supervised linear classification method that has the great property of maximizing margins between classes. It also has non-linear extensions in the form of kernel functions [2]. I have used the open-source LIBSVM package for implementation. To use the SVM, we need to transform the 3 k matrix to a fixed length vector. In this case, the matrices were transformed to a 10-dimensional vector with basic statistical elements like minimum, maximum, mean, length, etc. These statistical values describe the direction and dynamics of the gesture. To make all dimensions equal, z-normalization have been used: x i = x i x σ where x is the mean and σ is the variance. (3) In the system prototype, there is a possibility to predefine actions for each gestures. These actions can be runnable scripts or applications on the computer, or even the mobile phone can be controlled via Bluetooth serial connection. AT modem commands can simulate key-presses on the mobile phone, so we can navigate and reach regularly used menu items by doing gestures. It works like a perfect mobile gesture interface in the Bluetooth range of the computer. The above described algorithms are all designed for low resource usage, so they can be implemented to the mobile phone. In this case the gesture interface works without computers. 4. Results To test the accuracy of the recognition, a dataset of gestures have been created. I have defined 10 different gestures, half of them are hand movements using mainly the wrist, and half of them are wider arm movements. The gestures were repeated 10 times by four different users, which provided 400 examples overall. Part of these examples were used to train the models and the other part was used for testing. In every test, crossvalidation was used to produce reliable results. We have also recorded 50 noise examples that were captured by the segmentator Accuracy of the classifiers The accuracy greatly depends on the number of gesture examples used for teaching. The more examples we have, the more accurate the model will be. Both algorithms have been tested with different number of teaching examples, which is denoted by N. Hidden Markov Models HMMs are able to filter movements that are not similar to predefined gestures. However, some noise still gets misclassified to a gesture. These are called false positives, while the real gestures that get filtered out, are called false negatives. As it can be seen on Table 1, noise filtering is

4 4 Z. PREKOPCSÁK, ACCELEROMETER BASED REAL-TIME GESTURE RECOGNITION around 95% accurate, and recognition rate also rises above 95% in most cases with 4 teaching examples already. In case of 8 teaching examples, the HMM algorithm results 97.4% accuracy on average. User Accuracy Noise N=2 N=4 N=8 filtering U % 97.69% 98.44% 94.1% U % 97.63% 98.44% 94.54% U % 99.53% 100.0% 96.46% U % 90.94% 92.67% 96.8% Tab. 1. Accuracy of the HMM model for different users. N is the number of teaching examples. Support Vector Machine There is no noise filtering included in the SVM, so false positives and false negatives never occur. The SVM performs very well for low values of N, but it fails to improve as fastly as the HMM. In case of 8 teaching examples, the SVM algorithm results 96% accuracy on average. User Accuracy N=2 N=4 N=8 U % 98.29% 99.0% U % 99.24% 99.0% U % 90.59% 95.0% U % 87.9% 90.67% Tab. 2. Accuracy of the SVM model for different users. N is the number of teaching examples. Fig Error analysis Accuracy curves for different users and methods. The more teaching examples we have, the more accurate the model will be. It is interesting to investigate the typical errors of the classifiers. The SVM and HMM classifiers have some misclassification errors that might be corrected with the combination of the two algorithms. Table 3 shows misclassifications where the error rate is above 0.5%. It can be seen, that there is an overlap between the errors, but in some cases only one classifier makes the mistake, so the recognition rate can be improved by the combination of the two algorithms. G1 G2 G3 G4 G5 G6 G7 G8 G9 G10 G1 - G2 - G3 - G4 - G5 - G6 - G7 - G8 - G9 - G10 - Tab. 3. Confusion matrix for gestures. The marks typical errors by HMM and the marks misclassification by SVM. HMMs have false positives and false negatives too. The number of false positives and negatives can be adjusted by setting the probability threshold in the HMMs. When raising it higher, there will be more false negatives and less false positives, and vice versa when lowering the threshold Runtime analysis Runtime was tested on a new generation MacBook computer with a dual core 2 GHz processor and 1 GB memory. The software was developed and tested in the Eclipse 3.3 environment, Java 1.5 platform and Mac OS X 10.4 operating system. Tests were made for the teaching and the recognition phase separately. Measurements were repeated 10 times, the smallest and biggest values threw out, and averaged on the remaining 8 values. Teaching time turned out to be linearly dependent from the number of teaching examples. HMMs were trained in 46ms for one example and 324ms for nine examples. These values were 11ms and 39ms for SVM. Recognition time was independent from the number of teaching examples and averaged at 3.7ms for HMM and 0.4ms for SVM. On mobile platforms, these values are expected to rise with an order of magnitude, which results a few seconds of startup time, but the recognition time will be far below 100ms, which is the threshold for real-time interfaces [9]. 5. Conclusion In this paper, I have presented and evaluated a hand gesture interface prototype which could be used in industrial applications. The gesture set is completely personalizable, so everyone can use the gestures that he/she feels natural for a certain function. Instead of using button-based segmentation I have implemented an automatic segmentation method with which the interface is easier to use.

5 POSTER 2008, PRAGUE MAY 15 5 I have created two classification algorithms that provided 97.4% and 96% accuracy respectively. The HMM classifier is able to filter more than 95% of noise movements. The system has great performance and low response time, and the user experience is much better than with previous gesture recognizers. About Authors... Acknowledgements Most of the research described in the paper was sponsored by Kitchen Budapest and I thank all the researchers and coordinators for their continuous support. I also thank my supervisors, Csaba Gáspár-Papanek and Péter Halácsy, for their helpful discussions about this research. Zoltán PREKOPCSÁK was born in Budapest, Hungary. He is an information technology student at Budapest University of Technology and Economics specializing in data mining, machine learning and human-computer interaction. He is a researcher at the Kitchen Budapest medialab, and he participates in university research projects. Beyond being a student and a researcher, he works for a web startup company. References [1] BENBASAT, A.Y., PARADISO, J.A. An inertial measurement framework for gesture recognition and applications. Gesture and Sign Language in Human-Computer Interaction, International Gesture Workshop, [2] BURGES, C.J.C. A tutorial on support vector machines for pattern recognition. Data Mining and Knowledge Discovery, 1998, vol. 2, no. 2, p [3] DUGAD, R., DESAI, U.B. A tutorial on hidden Markov models. Indian Institute of Technology, [4] HOFMANN, F.G., HEYER, P., HOMMEL, G. Velocity profile based recognition of dynamic gestures with discrete hidden Markov models. Gesture and Sign Language in Human-Computer Interaction, 1997, p [5] KALLIO, S., KELA, J., MÄNTYJÄRVI, J. Online gesture recognition system for mobile interaction. IEEE International Conference on Systems, Man and Cybernetics, [6] KORPIPÄÄ, P. et al. Customizing user interaction in smart phones. IEEE Pervasive Computing, 2006, vol. 5, no. 3, p [7] LOVELL, S.D. A System for Real-Time Gesture Recognition and Classification of Coordinated Motion. Massachusetts Institute of Technology, [8] MÄNTYLÄ, V.M., MÄNTYJÄRVI, J., SEPPÄNEN, T., TUULARI, E. Hand gesture recognition of a mobile device user. IEEE International Conference on Multimedia and Expo, [9] NIELSEN, J. et al. Usability Engineering. Morgan Kaufmann, [10] PREKOPCSÁK, Z. Design and development of an everyday hand gesture interface. MobileHCI 2008 (pending), Amsterdam (The Netherlands), [11] PYLVÄNÄINEN, T. Accelerometer based gesture recognition using continuous HMMs. Lecture Notes in Computer Science (IbPRIA 2005 Proceedings), 2005, p [12] TUULARI, E., YLISAUKKO-OJA, A. SoapBox: A platform for ubiquitous computing research and applications. Lecture Notes in Computer Science, 2002, vol [13] VOGLER, C., METAXAS, D. A framework for recognizing the simultaneous aspects of American sign language. Computer Vision and Image Understanding, 2001, vol. 81, no. 3, p

Intrusion Detection via Machine Learning for SCADA System Protection

Intrusion Detection via Machine Learning for SCADA System Protection Intrusion Detection via Machine Learning for SCADA System Protection S.L.P. Yasakethu Department of Computing, University of Surrey, Guildford, GU2 7XH, UK. s.l.yasakethu@surrey.ac.uk J. Jiang Department

More information

Human Activities Recognition in Android Smartphone Using Support Vector Machine

Human Activities Recognition in Android Smartphone Using Support Vector Machine 2016 7th International Conference on Intelligent Systems, Modelling and Simulation Human Activities Recognition in Android Smartphone Using Support Vector Machine Duc Ngoc Tran Computer Engineer Faculty

More information

Active Learning SVM for Blogs recommendation

Active Learning SVM for Blogs recommendation Active Learning SVM for Blogs recommendation Xin Guan Computer Science, George Mason University Ⅰ.Introduction In the DH Now website, they try to review a big amount of blogs and articles and find the

More information

Designing and Embodiment of Software that Creates Middle Ware for Resource Management in Embedded System

Designing and Embodiment of Software that Creates Middle Ware for Resource Management in Embedded System , pp.97-108 http://dx.doi.org/10.14257/ijseia.2014.8.6.08 Designing and Embodiment of Software that Creates Middle Ware for Resource Management in Embedded System Suk Hwan Moon and Cheol sick Lee Department

More information

Trading Strategies and the Cat Tournament Protocol

Trading Strategies and the Cat Tournament Protocol M A C H I N E L E A R N I N G P R O J E C T F I N A L R E P O R T F A L L 2 7 C S 6 8 9 CLASSIFICATION OF TRADING STRATEGIES IN ADAPTIVE MARKETS MARK GRUMAN MANJUNATH NARAYANA Abstract In the CAT Tournament,

More information

A Demonstration of a Robust Context Classification System (CCS) and its Context ToolChain (CTC)

A Demonstration of a Robust Context Classification System (CCS) and its Context ToolChain (CTC) A Demonstration of a Robust Context Classification System () and its Context ToolChain (CTC) Martin Berchtold, Henning Günther and Michael Beigl Institut für Betriebssysteme und Rechnerverbund Abstract.

More information

Blog Post Extraction Using Title Finding

Blog Post Extraction Using Title Finding Blog Post Extraction Using Title Finding Linhai Song 1, 2, Xueqi Cheng 1, Yan Guo 1, Bo Wu 1, 2, Yu Wang 1, 2 1 Institute of Computing Technology, Chinese Academy of Sciences, Beijing 2 Graduate School

More information

Scalable Developments for Big Data Analytics in Remote Sensing

Scalable Developments for Big Data Analytics in Remote Sensing Scalable Developments for Big Data Analytics in Remote Sensing Federated Systems and Data Division Research Group High Productivity Data Processing Dr.-Ing. Morris Riedel et al. Research Group Leader,

More information

Journal of Industrial Engineering Research. Adaptive sequence of Key Pose Detection for Human Action Recognition

Journal of Industrial Engineering Research. Adaptive sequence of Key Pose Detection for Human Action Recognition IWNEST PUBLISHER Journal of Industrial Engineering Research (ISSN: 2077-4559) Journal home page: http://www.iwnest.com/aace/ Adaptive sequence of Key Pose Detection for Human Action Recognition 1 T. Sindhu

More information

Data Quality Mining: Employing Classifiers for Assuring consistent Datasets

Data Quality Mining: Employing Classifiers for Assuring consistent Datasets Data Quality Mining: Employing Classifiers for Assuring consistent Datasets Fabian Grüning Carl von Ossietzky Universität Oldenburg, Germany, fabian.gruening@informatik.uni-oldenburg.de Abstract: Independent

More information

Search Taxonomy. Web Search. Search Engine Optimization. Information Retrieval

Search Taxonomy. Web Search. Search Engine Optimization. Information Retrieval Information Retrieval INFO 4300 / CS 4300! Retrieval models Older models» Boolean retrieval» Vector Space model Probabilistic Models» BM25» Language models Web search» Learning to Rank Search Taxonomy!

More information

A Reliability Point and Kalman Filter-based Vehicle Tracking Technique

A Reliability Point and Kalman Filter-based Vehicle Tracking Technique A Reliability Point and Kalman Filter-based Vehicle Tracing Technique Soo Siang Teoh and Thomas Bräunl Abstract This paper introduces a technique for tracing the movement of vehicles in consecutive video

More information

Azure Machine Learning, SQL Data Mining and R

Azure Machine Learning, SQL Data Mining and R Azure Machine Learning, SQL Data Mining and R Day-by-day Agenda Prerequisites No formal prerequisites. Basic knowledge of SQL Server Data Tools, Excel and any analytical experience helps. Best of all:

More information

KEITH LEHNERT AND ERIC FRIEDRICH

KEITH LEHNERT AND ERIC FRIEDRICH MACHINE LEARNING CLASSIFICATION OF MALICIOUS NETWORK TRAFFIC KEITH LEHNERT AND ERIC FRIEDRICH 1. Introduction 1.1. Intrusion Detection Systems. In our society, information systems are everywhere. They

More information

Advanced Ensemble Strategies for Polynomial Models

Advanced Ensemble Strategies for Polynomial Models Advanced Ensemble Strategies for Polynomial Models Pavel Kordík 1, Jan Černý 2 1 Dept. of Computer Science, Faculty of Information Technology, Czech Technical University in Prague, 2 Dept. of Computer

More information

Mouse Control using a Web Camera based on Colour Detection

Mouse Control using a Web Camera based on Colour Detection Mouse Control using a Web Camera based on Colour Detection Abhik Banerjee 1, Abhirup Ghosh 2, Koustuvmoni Bharadwaj 3, Hemanta Saikia 4 1, 2, 3, 4 Department of Electronics & Communication Engineering,

More information

Practical Data Science with Azure Machine Learning, SQL Data Mining, and R

Practical Data Science with Azure Machine Learning, SQL Data Mining, and R Practical Data Science with Azure Machine Learning, SQL Data Mining, and R Overview This 4-day class is the first of the two data science courses taught by Rafal Lukawiecki. Some of the topics will be

More information

International Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 3, May-Jun 2014

International Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 3, May-Jun 2014 RESEARCH ARTICLE OPEN ACCESS A Survey of Data Mining: Concepts with Applications and its Future Scope Dr. Zubair Khan 1, Ashish Kumar 2, Sunny Kumar 3 M.Tech Research Scholar 2. Department of Computer

More information

Machine learning for algo trading

Machine learning for algo trading Machine learning for algo trading An introduction for nonmathematicians Dr. Aly Kassam Overview High level introduction to machine learning A machine learning bestiary What has all this got to do with

More information

Predict Influencers in the Social Network

Predict Influencers in the Social Network Predict Influencers in the Social Network Ruishan Liu, Yang Zhao and Liuyu Zhou Email: rliu2, yzhao2, lyzhou@stanford.edu Department of Electrical Engineering, Stanford University Abstract Given two persons

More information

Rule based Classification of BSE Stock Data with Data Mining

Rule based Classification of BSE Stock Data with Data Mining International Journal of Information Sciences and Application. ISSN 0974-2255 Volume 4, Number 1 (2012), pp. 1-9 International Research Publication House http://www.irphouse.com Rule based Classification

More information

A Novel Identification/Verification Model Using Smartphone s Sensors and User Behavior

A Novel Identification/Verification Model Using Smartphone s Sensors and User Behavior A Novel Identification/Verification Model Using Smartphone s Sensors and User Behavior Dandachi Ghina, Bachar El Hassan, Anas El Husseini To cite this version: Dandachi Ghina, Bachar El Hassan, Anas El

More information

Analecta Vol. 8, No. 2 ISSN 2064-7964

Analecta Vol. 8, No. 2 ISSN 2064-7964 EXPERIMENTAL APPLICATIONS OF ARTIFICIAL NEURAL NETWORKS IN ENGINEERING PROCESSING SYSTEM S. Dadvandipour Institute of Information Engineering, University of Miskolc, Egyetemváros, 3515, Miskolc, Hungary,

More information

Game Transformation from Non-Augmented Reality to Augmented Reality

Game Transformation from Non-Augmented Reality to Augmented Reality INTERNATIONAL JOURNAL OF KIMICS, VOL. 9, NO. 5, OCTOBER 2011 619 Game Transformation from Non-Augmented Reality to Augmented Reality Chin-Tong Tan, Gi-Hyun Hwang, and Dae- Ki Kang *, Member, KIMICS Abstract

More information

DATA MINING TECHNIQUES AND APPLICATIONS

DATA MINING TECHNIQUES AND APPLICATIONS DATA MINING TECHNIQUES AND APPLICATIONS Mrs. Bharati M. Ramageri, Lecturer Modern Institute of Information Technology and Research, Department of Computer Application, Yamunanagar, Nigdi Pune, Maharashtra,

More information

Operations Research and Knowledge Modeling in Data Mining

Operations Research and Knowledge Modeling in Data Mining Operations Research and Knowledge Modeling in Data Mining Masato KODA Graduate School of Systems and Information Engineering University of Tsukuba, Tsukuba Science City, Japan 305-8573 koda@sk.tsukuba.ac.jp

More information

Implementation of a Wireless Gesture Controlled Robotic Arm

Implementation of a Wireless Gesture Controlled Robotic Arm Implementation of a Wireless Gesture Controlled Robotic Arm Saurabh A. Khajone 1, Dr. S. W. Mohod 2, V.M. Harne 3 ME, Dept. of EXTC., PRMIT&R Badnera, Sant Gadge Baba University, Amravati (M.S.), India

More information

Interactive Visualization of Magnetic Fields

Interactive Visualization of Magnetic Fields JOURNAL OF APPLIED COMPUTER SCIENCE Vol. 21 No. 1 (2013), pp. 107-117 Interactive Visualization of Magnetic Fields Piotr Napieralski 1, Krzysztof Guzek 1 1 Institute of Information Technology, Lodz University

More information

Social Data Mining through Distributed Mobile Sensing: A Position Paper

Social Data Mining through Distributed Mobile Sensing: A Position Paper Social Data Mining through Distributed Mobile Sensing: A Position Paper John Gekas, Eurobank Research, Athens, GR Abstract. In this article, we present a distributed framework for collecting and analyzing

More information

Support Vector Machine (SVM)

Support Vector Machine (SVM) Support Vector Machine (SVM) CE-725: Statistical Pattern Recognition Sharif University of Technology Spring 2013 Soleymani Outline Margin concept Hard-Margin SVM Soft-Margin SVM Dual Problems of Hard-Margin

More information

OPNET Network Simulator

OPNET Network Simulator Simulations and Tools for Telecommunications 521365S: OPNET Network Simulator Jarmo Prokkola Research team leader, M. Sc. (Tech.) VTT Technical Research Centre of Finland Kaitoväylä 1, Oulu P.O. Box 1100,

More information

How to use Big Data in Industry 4.0 implementations. LAURI ILISON, PhD Head of Big Data and Machine Learning

How to use Big Data in Industry 4.0 implementations. LAURI ILISON, PhD Head of Big Data and Machine Learning How to use Big Data in Industry 4.0 implementations LAURI ILISON, PhD Head of Big Data and Machine Learning Big Data definition? Big Data is about structured vs unstructured data Big Data is about Volume

More information

Intelligent Submersible Manipulator-Robot, Design, Modeling, Simulation and Motion Optimization for Maritime Robotic Research

Intelligent Submersible Manipulator-Robot, Design, Modeling, Simulation and Motion Optimization for Maritime Robotic Research 20th International Congress on Modelling and Simulation, Adelaide, Australia, 1 6 December 2013 www.mssanz.org.au/modsim2013 Intelligent Submersible Manipulator-Robot, Design, Modeling, Simulation and

More information

Hardware Implementation of Probabilistic State Machine for Word Recognition

Hardware Implementation of Probabilistic State Machine for Word Recognition IJECT Vo l. 4, Is s u e Sp l - 5, Ju l y - Se p t 2013 ISSN : 2230-7109 (Online) ISSN : 2230-9543 (Print) Hardware Implementation of Probabilistic State Machine for Word Recognition 1 Soorya Asokan, 2

More information

FreeForm Designer. Phone: +972-9-8309999 Fax: +972-9-8309998 POB 8792, Natanya, 42505 Israel www.autofont.com. Document2

FreeForm Designer. Phone: +972-9-8309999 Fax: +972-9-8309998 POB 8792, Natanya, 42505 Israel www.autofont.com. Document2 FreeForm Designer FreeForm Designer enables designing smart forms based on industry-standard MS Word editing features. FreeForm Designer does not require any knowledge of or training in programming languages

More information

Go to contents 18 3D Visualization of Building Services in Virtual Environment

Go to contents 18 3D Visualization of Building Services in Virtual Environment 3D Visualization of Building Services in Virtual Environment GRÖHN, Matti Gröhn; MANTERE, Markku; SAVIOJA, Lauri; TAKALA, Tapio Telecommunications Software and Multimedia Laboratory Department of Computer

More information

Effective Interface Design Using Face Detection for Augmented Reality Interaction of Smart Phone

Effective Interface Design Using Face Detection for Augmented Reality Interaction of Smart Phone Effective Interface Design Using Face Detection for Augmented Reality Interaction of Smart Phone Young Jae Lee Dept. of Multimedia, Jeonju University #45, Backma-Gil, Wansan-Gu,Jeonju, Jeonbul, 560-759,

More information

WIRELESS BLACK BOX USING MEMS ACCELEROMETER AND GPS TRACKING FOR ACCIDENTAL MONITORING OF VEHICLES

WIRELESS BLACK BOX USING MEMS ACCELEROMETER AND GPS TRACKING FOR ACCIDENTAL MONITORING OF VEHICLES WIRELESS BLACK BOX USING MEMS ACCELEROMETER AND GPS TRACKING FOR ACCIDENTAL MONITORING OF VEHICLES PROJECT REFERENCE NO. : 37S0430 COLLEGE BRANCH GUIDE : S.G.BALEKUNDRI INSTITUTE OF TECHNOLOGY,BELGAUM

More information

Making Sense of the Mayhem: Machine Learning and March Madness

Making Sense of the Mayhem: Machine Learning and March Madness Making Sense of the Mayhem: Machine Learning and March Madness Alex Tran and Adam Ginzberg Stanford University atran3@stanford.edu ginzberg@stanford.edu I. Introduction III. Model The goal of our research

More information

DATA MINING TOOL FOR INTEGRATED COMPLAINT MANAGEMENT SYSTEM WEKA 3.6.7

DATA MINING TOOL FOR INTEGRATED COMPLAINT MANAGEMENT SYSTEM WEKA 3.6.7 DATA MINING TOOL FOR INTEGRATED COMPLAINT MANAGEMENT SYSTEM WEKA 3.6.7 UNDER THE GUIDANCE Dr. N.P. DHAVALE, DGM, INFINET Department SUBMITTED TO INSTITUTE FOR DEVELOPMENT AND RESEARCH IN BANKING TECHNOLOGY

More information

BIG DATA What it is and how to use?

BIG DATA What it is and how to use? BIG DATA What it is and how to use? Lauri Ilison, PhD Data Scientist 21.11.2014 Big Data definition? There is no clear definition for BIG DATA BIG DATA is more of a concept than precise term 1 21.11.14

More information

COURSE RECOMMENDER SYSTEM IN E-LEARNING

COURSE RECOMMENDER SYSTEM IN E-LEARNING International Journal of Computer Science and Communication Vol. 3, No. 1, January-June 2012, pp. 159-164 COURSE RECOMMENDER SYSTEM IN E-LEARNING Sunita B Aher 1, Lobo L.M.R.J. 2 1 M.E. (CSE)-II, Walchand

More information

CONATION: English Command Input/Output System for Computers

CONATION: English Command Input/Output System for Computers CONATION: English Command Input/Output System for Computers Kamlesh Sharma* and Dr. T. V. Prasad** * Research Scholar, ** Professor & Head Dept. of Comp. Sc. & Engg., Lingaya s University, Faridabad, India

More information

Automated Content Analysis of Discussion Transcripts

Automated Content Analysis of Discussion Transcripts Automated Content Analysis of Discussion Transcripts Vitomir Kovanović v.kovanovic@ed.ac.uk Dragan Gašević dgasevic@acm.org School of Informatics, University of Edinburgh Edinburgh, United Kingdom v.kovanovic@ed.ac.uk

More information

CS 2750 Machine Learning. Lecture 1. Machine Learning. http://www.cs.pitt.edu/~milos/courses/cs2750/ CS 2750 Machine Learning.

CS 2750 Machine Learning. Lecture 1. Machine Learning. http://www.cs.pitt.edu/~milos/courses/cs2750/ CS 2750 Machine Learning. Lecture Machine Learning Milos Hauskrecht milos@cs.pitt.edu 539 Sennott Square, x5 http://www.cs.pitt.edu/~milos/courses/cs75/ Administration Instructor: Milos Hauskrecht milos@cs.pitt.edu 539 Sennott

More information

SVM Ensemble Model for Investment Prediction

SVM Ensemble Model for Investment Prediction 19 SVM Ensemble Model for Investment Prediction Chandra J, Assistant Professor, Department of Computer Science, Christ University, Bangalore Siji T. Mathew, Research Scholar, Christ University, Dept of

More information

Government of Russian Federation. Faculty of Computer Science School of Data Analysis and Artificial Intelligence

Government of Russian Federation. Faculty of Computer Science School of Data Analysis and Artificial Intelligence Government of Russian Federation Federal State Autonomous Educational Institution of High Professional Education National Research University «Higher School of Economics» Faculty of Computer Science School

More information

FOREX TRADING PREDICTION USING LINEAR REGRESSION LINE, ARTIFICIAL NEURAL NETWORK AND DYNAMIC TIME WARPING ALGORITHMS

FOREX TRADING PREDICTION USING LINEAR REGRESSION LINE, ARTIFICIAL NEURAL NETWORK AND DYNAMIC TIME WARPING ALGORITHMS FOREX TRADING PREDICTION USING LINEAR REGRESSION LINE, ARTIFICIAL NEURAL NETWORK AND DYNAMIC TIME WARPING ALGORITHMS Leslie C.O. Tiong 1, David C.L. Ngo 2, and Yunli Lee 3 1 Sunway University, Malaysia,

More information

Graduate Co-op Students Information Manual. Department of Computer Science. Faculty of Science. University of Regina

Graduate Co-op Students Information Manual. Department of Computer Science. Faculty of Science. University of Regina Graduate Co-op Students Information Manual Department of Computer Science Faculty of Science University of Regina 2014 1 Table of Contents 1. Department Description..3 2. Program Requirements and Procedures

More information

Learning is a very general term denoting the way in which agents:

Learning is a very general term denoting the way in which agents: What is learning? Learning is a very general term denoting the way in which agents: Acquire and organize knowledge (by building, modifying and organizing internal representations of some external reality);

More information

A DECISION TREE BASED PEDOMETER AND ITS IMPLEMENTATION ON THE ANDROID PLATFORM

A DECISION TREE BASED PEDOMETER AND ITS IMPLEMENTATION ON THE ANDROID PLATFORM A DECISION TREE BASED PEDOMETER AND ITS IMPLEMENTATION ON THE ANDROID PLATFORM ABSTRACT Juanying Lin, Leanne Chan and Hong Yan Department of Electronic Engineering, City University of Hong Kong, Hong Kong,

More information

Support Vector Machines with Clustering for Training with Very Large Datasets

Support Vector Machines with Clustering for Training with Very Large Datasets Support Vector Machines with Clustering for Training with Very Large Datasets Theodoros Evgeniou Technology Management INSEAD Bd de Constance, Fontainebleau 77300, France theodoros.evgeniou@insead.fr Massimiliano

More information

Support Vector Machines for Dynamic Biometric Handwriting Classification

Support Vector Machines for Dynamic Biometric Handwriting Classification Support Vector Machines for Dynamic Biometric Handwriting Classification Tobias Scheidat, Marcus Leich, Mark Alexander, and Claus Vielhauer Abstract Biometric user authentication is a recent topic in the

More information

STMicroelectronics is pleased to present the. SENSational. Attend a FREE One-Day Technical Seminar Near YOU!

STMicroelectronics is pleased to present the. SENSational. Attend a FREE One-Day Technical Seminar Near YOU! SENSational STMicroelectronics is pleased to present the SENSational Seminar Attend a FREE One-Day Technical Seminar Near YOU! Seminar Sensors and the Internet of Things are changing the way we interact

More information

Efficient Load Balancing using VM Migration by QEMU-KVM

Efficient Load Balancing using VM Migration by QEMU-KVM International Journal of Computer Science and Telecommunications [Volume 5, Issue 8, August 2014] 49 ISSN 2047-3338 Efficient Load Balancing using VM Migration by QEMU-KVM Sharang Telkikar 1, Shreyas Talele

More information

WAITER: A Wearable Personal Healthcare and Emergency Aid System

WAITER: A Wearable Personal Healthcare and Emergency Aid System Sixth Annual IEEE International Conference on Pervasive Computing and Communications WAITER: A Wearable Personal Healthcare and Emergency Aid System Wanhong Wu 1, Jiannong Cao 1, Yuan Zheng 1, Yong-Ping

More information

Fraud Detection in Online Banking Using HMM

Fraud Detection in Online Banking Using HMM 2012 International Conference on Information and Network Technology (ICINT 2012) IPCSIT vol. 37 (2012) (2012) IACSIT Press, Singapore Fraud Detection in Online Banking Using HMM Sunil Mhamane + and L.M.R.J

More information

Android Phone Controlled Robot Using Bluetooth

Android Phone Controlled Robot Using Bluetooth International Journal of Electronic and Electrical Engineering. ISSN 0974-2174, Volume 7, Number 5 (2014), pp. 443-448 International Research Publication House http://www.irphouse.com Android Phone Controlled

More information

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc])

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc]) 305 REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc]) (See also General Regulations) Any publication based on work approved for a higher degree should contain a reference

More information

Comparative Analysis of EM Clustering Algorithm and Density Based Clustering Algorithm Using WEKA tool.

Comparative Analysis of EM Clustering Algorithm and Density Based Clustering Algorithm Using WEKA tool. International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 9, Issue 8 (January 2014), PP. 19-24 Comparative Analysis of EM Clustering Algorithm

More information

Advanced analytics at your hands

Advanced analytics at your hands 2.3 Advanced analytics at your hands Neural Designer is the most powerful predictive analytics software. It uses innovative neural networks techniques to provide data scientists with results in a way previously

More information

MAXIMIZING RETURN ON DIRECT MARKETING CAMPAIGNS

MAXIMIZING RETURN ON DIRECT MARKETING CAMPAIGNS MAXIMIZING RETURN ON DIRET MARKETING AMPAIGNS IN OMMERIAL BANKING S 229 Project: Final Report Oleksandra Onosova INTRODUTION Recent innovations in cloud computing and unified communications have made a

More information

Knowledge Discovery from patents using KMX Text Analytics

Knowledge Discovery from patents using KMX Text Analytics Knowledge Discovery from patents using KMX Text Analytics Dr. Anton Heijs anton.heijs@treparel.com Treparel Abstract In this white paper we discuss how the KMX technology of Treparel can help searchers

More information

Ericsson T18s Voice Dialing Simulator

Ericsson T18s Voice Dialing Simulator Ericsson T18s Voice Dialing Simulator Mauricio Aracena Kovacevic, Anna Dehlbom, Jakob Ekeberg, Guillaume Gariazzo, Eric Lästh and Vanessa Troncoso Dept. of Signals Sensors and Systems Royal Institute of

More information

Modelling, Extraction and Description of Intrinsic Cues of High Resolution Satellite Images: Independent Component Analysis based approaches

Modelling, Extraction and Description of Intrinsic Cues of High Resolution Satellite Images: Independent Component Analysis based approaches Modelling, Extraction and Description of Intrinsic Cues of High Resolution Satellite Images: Independent Component Analysis based approaches PhD Thesis by Payam Birjandi Director: Prof. Mihai Datcu Problematic

More information

Information Management course

Information Management course Università degli Studi di Milano Master Degree in Computer Science Information Management course Teacher: Alberto Ceselli Lecture 01 : 06/10/2015 Practical informations: Teacher: Alberto Ceselli (alberto.ceselli@unimi.it)

More information

The Scientific Data Mining Process

The Scientific Data Mining Process Chapter 4 The Scientific Data Mining Process When I use a word, Humpty Dumpty said, in rather a scornful tone, it means just what I choose it to mean neither more nor less. Lewis Carroll [87, p. 214] In

More information

A secure face tracking system

A secure face tracking system International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 10 (2014), pp. 959-964 International Research Publications House http://www. irphouse.com A secure face tracking

More information

GURLS: A Least Squares Library for Supervised Learning

GURLS: A Least Squares Library for Supervised Learning Journal of Machine Learning Research 14 (2013) 3201-3205 Submitted 1/12; Revised 2/13; Published 10/13 GURLS: A Least Squares Library for Supervised Learning Andrea Tacchetti Pavan K. Mallapragada Center

More information

Spam detection with data mining method:

Spam detection with data mining method: Spam detection with data mining method: Ensemble learning with multiple SVM based classifiers to optimize generalization ability of email spam classification Keywords: ensemble learning, SVM classifier,

More information

POTENTIAL OF STATE-FEEDBACK CONTROL FOR MACHINE TOOLS DRIVES

POTENTIAL OF STATE-FEEDBACK CONTROL FOR MACHINE TOOLS DRIVES POTENTIAL OF STATE-FEEDBACK CONTROL FOR MACHINE TOOLS DRIVES L. Novotny 1, P. Strakos 1, J. Vesely 1, A. Dietmair 2 1 Research Center of Manufacturing Technology, CTU in Prague, Czech Republic 2 SW, Universität

More information

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc])

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc]) 299 REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc]) (See also General Regulations) Any publication based on work approved for a higher degree should contain a reference

More information

How To Cluster

How To Cluster Data Clustering Dec 2nd, 2013 Kyrylo Bessonov Talk outline Introduction to clustering Types of clustering Supervised Unsupervised Similarity measures Main clustering algorithms k-means Hierarchical Main

More information

EM Clustering Approach for Multi-Dimensional Analysis of Big Data Set

EM Clustering Approach for Multi-Dimensional Analysis of Big Data Set EM Clustering Approach for Multi-Dimensional Analysis of Big Data Set Amhmed A. Bhih School of Electrical and Electronic Engineering Princy Johnson School of Electrical and Electronic Engineering Martin

More information

GLOVE-BASED GESTURE RECOGNITION SYSTEM

GLOVE-BASED GESTURE RECOGNITION SYSTEM CLAWAR 2012 Proceedings of the Fifteenth International Conference on Climbing and Walking Robots and the Support Technologies for Mobile Machines, Baltimore, MD, USA, 23 26 July 2012 747 GLOVE-BASED GESTURE

More information

A Conceptual Approach to Data Visualization for User Interface Design of Smart Grid Operation Tools

A Conceptual Approach to Data Visualization for User Interface Design of Smart Grid Operation Tools A Conceptual Approach to Data Visualization for User Interface Design of Smart Grid Operation Tools Dong-Joo Kang and Sunju Park Yonsei University unlimit0909@hotmail.com, boxenju@yonsei.ac.kr Abstract

More information

Comparison of Non-linear Dimensionality Reduction Techniques for Classification with Gene Expression Microarray Data

Comparison of Non-linear Dimensionality Reduction Techniques for Classification with Gene Expression Microarray Data CMPE 59H Comparison of Non-linear Dimensionality Reduction Techniques for Classification with Gene Expression Microarray Data Term Project Report Fatma Güney, Kübra Kalkan 1/15/2013 Keywords: Non-linear

More information

International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 3, May-June 2015

International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 3, May-June 2015 RESEARCH ARTICLE OPEN ACCESS Data Mining Technology for Efficient Network Security Management Ankit Naik [1], S.W. Ahmad [2] Student [1], Assistant Professor [2] Department of Computer Science and Engineering

More information

TOWARDS SIMPLE, EASY TO UNDERSTAND, AN INTERACTIVE DECISION TREE ALGORITHM

TOWARDS SIMPLE, EASY TO UNDERSTAND, AN INTERACTIVE DECISION TREE ALGORITHM TOWARDS SIMPLE, EASY TO UNDERSTAND, AN INTERACTIVE DECISION TREE ALGORITHM Thanh-Nghi Do College of Information Technology, Cantho University 1 Ly Tu Trong Street, Ninh Kieu District Cantho City, Vietnam

More information

OPNET - Network Simulator

OPNET - Network Simulator Simulations and Tools for Telecommunications 521365S: OPNET - Network Simulator Jarmo Prokkola Project Manager, M. Sc. (Tech.) VTT Technical Research Centre of Finland Kaitoväylä 1, Oulu P.O. Box 1100,

More information

Redundant Data Removal Technique for Efficient Big Data Search Processing

Redundant Data Removal Technique for Efficient Big Data Search Processing Redundant Data Removal Technique for Efficient Big Data Search Processing Seungwoo Jeon 1, Bonghee Hong 1, Joonho Kwon 2, Yoon-sik Kwak 3 and Seok-il Song 3 1 Dept. of Computer Engineering, Pusan National

More information

Cloud Storage-based Intelligent Document Archiving for the Management of Big Data

Cloud Storage-based Intelligent Document Archiving for the Management of Big Data Cloud Storage-based Intelligent Document Archiving for the Management of Big Data Keedong Yoo Dept. of Management Information Systems Dankook University Cheonan, Republic of Korea Abstract : The cloud

More information

Predicting the Risk of Heart Attacks using Neural Network and Decision Tree

Predicting the Risk of Heart Attacks using Neural Network and Decision Tree Predicting the Risk of Heart Attacks using Neural Network and Decision Tree S.Florence 1, N.G.Bhuvaneswari Amma 2, G.Annapoorani 3, K.Malathi 4 PG Scholar, Indian Institute of Information Technology, Srirangam,

More information

Inactivity Recognition: Separating Moving Phones from Stationary Users

Inactivity Recognition: Separating Moving Phones from Stationary Users Inactivity Recognition: Separating Moving Phones from Stationary Users James Reinebold reinebol@usc.edu Harshvardhan Vathsangam vathsang@usc.edu Gaurav S. Sukhatme gaurav@usc.edu ABSTRACT Accurate methods

More information

SYLLABUSES FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (applicable to students admitted in the academic year 2015-2016 and thereafter)

SYLLABUSES FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (applicable to students admitted in the academic year 2015-2016 and thereafter) MSc(CompSc)-1 (SUBJECT TO UNIVERSITY S APPROVAL) SYLLABUSES FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (applicable to students admitted in the academic year 2015-2016 and thereafter) The curriculum

More information

203.4770: Introduction to Machine Learning Dr. Rita Osadchy

203.4770: Introduction to Machine Learning Dr. Rita Osadchy 203.4770: Introduction to Machine Learning Dr. Rita Osadchy 1 Outline 1. About the Course 2. What is Machine Learning? 3. Types of problems and Situations 4. ML Example 2 About the course Course Homepage:

More information

Development of Integrated Management System based on Mobile and Cloud service for preventing various dangerous situations

Development of Integrated Management System based on Mobile and Cloud service for preventing various dangerous situations Development of Integrated Management System based on Mobile and Cloud service for preventing various dangerous situations Ryu HyunKi, Moon ChangSoo, Yeo ChangSub, and Lee HaengSuk Abstract In this paper,

More information

Analysis Tools and Libraries for BigData

Analysis Tools and Libraries for BigData + Analysis Tools and Libraries for BigData Lecture 02 Abhijit Bendale + Office Hours 2 n Terry Boult (Waiting to Confirm) n Abhijit Bendale (Tue 2:45 to 4:45 pm). Best if you email me in advance, but I

More information

DECISION TREE INDUCTION FOR FINANCIAL FRAUD DETECTION USING ENSEMBLE LEARNING TECHNIQUES

DECISION TREE INDUCTION FOR FINANCIAL FRAUD DETECTION USING ENSEMBLE LEARNING TECHNIQUES DECISION TREE INDUCTION FOR FINANCIAL FRAUD DETECTION USING ENSEMBLE LEARNING TECHNIQUES Vijayalakshmi Mahanra Rao 1, Yashwant Prasad Singh 2 Multimedia University, Cyberjaya, MALAYSIA 1 lakshmi.mahanra@gmail.com

More information

REAL TIME TRAFFIC LIGHT CONTROL USING IMAGE PROCESSING

REAL TIME TRAFFIC LIGHT CONTROL USING IMAGE PROCESSING REAL TIME TRAFFIC LIGHT CONTROL USING IMAGE PROCESSING Ms.PALLAVI CHOUDEKAR Ajay Kumar Garg Engineering College, Department of electrical and electronics Ms.SAYANTI BANERJEE Ajay Kumar Garg Engineering

More information

Preventing Denial-of-request Inference Attacks in Location-sharing Services

Preventing Denial-of-request Inference Attacks in Location-sharing Services Preventing Denial-of-request Inference Attacks in Location-sharing Services Kazuhiro Minami Institute of Statistical Mathematics, Tokyo, Japan Email: kminami@ism.ac.jp Abstract Location-sharing services

More information

Application of Android OS as Real-time Control Platform**

Application of Android OS as Real-time Control Platform** AUTOMATYKA/ AUTOMATICS 2013 Vol. 17 No. 2 http://dx.doi.org/10.7494/automat.2013.17.2.197 Krzysztof Ko³ek* Application of Android OS as Real-time Control Platform** 1. Introduction An android operating

More information

Monitoring and Mining Sensor Data in Cloud Computing Environments

Monitoring and Mining Sensor Data in Cloud Computing Environments Monitoring and Mining Sensor Data in Cloud Computing Environments Wen-Chih Peng and Yu-Chee Tseng Dept. of Computer Science National Chiao Tung University {wcpeng, yctseng}@cs.nctu.edu.tw 1 Outline Sensor

More information

Supervised Feature Selection & Unsupervised Dimensionality Reduction

Supervised Feature Selection & Unsupervised Dimensionality Reduction Supervised Feature Selection & Unsupervised Dimensionality Reduction Feature Subset Selection Supervised: class labels are given Select a subset of the problem features Why? Redundant features much or

More information

Comparing the Results of Support Vector Machines with Traditional Data Mining Algorithms

Comparing the Results of Support Vector Machines with Traditional Data Mining Algorithms Comparing the Results of Support Vector Machines with Traditional Data Mining Algorithms Scott Pion and Lutz Hamel Abstract This paper presents the results of a series of analyses performed on direct mail

More information

An Introduction to Data Mining

An Introduction to Data Mining An Introduction to Intel Beijing wei.heng@intel.com January 17, 2014 Outline 1 DW Overview What is Notable Application of Conference, Software and Applications Major Process in 2 Major Tasks in Detail

More information

1 Topic. 2 Scilab. 2.1 What is Scilab?

1 Topic. 2 Scilab. 2.1 What is Scilab? 1 Topic Data Mining with Scilab. I know the name "Scilab" for a long time (http://www.scilab.org/en). For me, it is a tool for numerical analysis. It seemed not interesting in the context of the statistical

More information

CCNY. BME I5100: Biomedical Signal Processing. Linear Discrimination. Lucas C. Parra Biomedical Engineering Department City College of New York

CCNY. BME I5100: Biomedical Signal Processing. Linear Discrimination. Lucas C. Parra Biomedical Engineering Department City College of New York BME I5100: Biomedical Signal Processing Linear Discrimination Lucas C. Parra Biomedical Engineering Department CCNY 1 Schedule Week 1: Introduction Linear, stationary, normal - the stuff biology is not

More information

A fast multi-class SVM learning method for huge databases

A fast multi-class SVM learning method for huge databases www.ijcsi.org 544 A fast multi-class SVM learning method for huge databases Djeffal Abdelhamid 1, Babahenini Mohamed Chaouki 2 and Taleb-Ahmed Abdelmalik 3 1,2 Computer science department, LESIA Laboratory,

More information

Continuous Fastest Path Planning in Road Networks by Mining Real-Time Traffic Event Information

Continuous Fastest Path Planning in Road Networks by Mining Real-Time Traffic Event Information Continuous Fastest Path Planning in Road Networks by Mining Real-Time Traffic Event Information Eric Hsueh-Chan Lu Chi-Wei Huang Vincent S. Tseng Institute of Computer Science and Information Engineering

More information